Day 144 – Cisco ISE Mastery Training: Automated Remediation for Non‑Compliance

[Day 144] Cisco ISE Mastery Training: Automated Remediation for Non‑Compliance


Introduction

In modern enterprise networks, compliance is dynamic. Users’ devices may fall out of compliance due to outdated antivirus, missing patches, disabled firewalls, or unapproved apps. Manual remediation is slow, error-prone, and disrupts productivity.

Automated Remediation in Cisco ISE transforms NAC from static enforcement into dynamic, real-time endpoint governance. When a device is non-compliant, ISE can:

  • Automatically quarantine or restrict access
  • Trigger Change of Authorization (CoA) on network devices
  • Notify users to remediate the issue
  • Grant full access once compliance is restored

This Article covers complete hands-on lab implementation, GUI/CLI validation, troubleshooting, and real-world expert use cases.


Problem Statement

Enterprises face:

  • Endpoints frequently falling out of compliance due to human error or automated updates
  • Manual remediation consuming IT resources and delaying access
  • Difficulty enforcing consistent policies across wired, wireless, and VPN networks
  • Risk of data exposure or malware propagation from non-compliant devices

Without automated remediation, organizations lose control over endpoint security posture and risk policy violations.


Solution Overview

Cisco ISE addresses these challenges through:

  1. Continuous Posture Assessment: Using AnyConnect/NAC Agent, endpoints report compliance in real-time.
  2. Dynamic Enforcement via CoA: When non-compliance is detected, ISE sends CoA to NADs/WLCs to apply quarantine VLANs or restricted ACLs.
  3. User Notification & Self-Remediation: Endpoint agents notify users of required actions, reducing IT workload.
  4. Policy-Based Full Access Recovery: Once endpoints resolve non-compliance, ISE automatically restores full access.
  5. Reporting & Auditing: Live Logs and Posture Reports track compliance trends and remediation success.

Sample Lab Topology

Lab Components:

  • ISE Node (PAN/PSN) – 3.1+
  • Endpoints – Windows 10, macOS, Android (with NAC/AnyConnect agent)
  • Switch – Catalyst 9300 (802.1X + CoA)
  • WLC – Cisco 9800 (Wi-Fi 802.1X + CoA)
  • VMware/EVE‑NG – Lab network, DHCP/DNS, AD + PKI
  • AD + PKI – For certificate-based authentication

Lab Topology:


Step‑by-Step GUI Configuration Guide

Step 1: Enable Posture Service

  1. Log in to ISE Admin GUIAdministration → System → Deployment.
  2. Select the ISE node (PAN/PSN).
  3. Click Edit Node → Services → Posture Service → Enable.
  4. Save changes and ensure Posture Service status is Running.
    • [Screenshot: ISE Posture Service Enabled]

Validation:

  • Navigate Operations → Posture → Endpoints → verify node is listed.

Step 2: Configure Endpoint Profiles

  1. GUI: Administration → Network Resources → Endpoints → Endpoint Profiles → Add
  2. Define profile for endpoint type: Windows, macOS, Android.
  3. Enable Posture Agent support → AnyConnect / NAC Agent.
  4. Save profile.
    • [Screenshot: Endpoint Profile Configuration]

Validation:

  • Connect test endpoint → Live Logs → Endpoint detected.

Step 3: Create Posture Conditions

Step 3a: Antivirus Check

  1. GUI: Policy → Policy Elements → Results → Posture → Conditions → Add
  2. Name: AV_Compliant
  3. Type: Endpoint Security → Attribute: Antivirus Status
  4. Operator: Equals → Value: Running / Up-to-Date
    • [Screenshot: Posture Condition – Antivirus]

Step 3b: Firewall Enabled

  1. Add new condition → Name: Firewall_Enabled
  2. Type: Endpoint Security → Firewall Status → Equals → Enabled
    • [Screenshot: Posture Condition – Firewall]

Step 3c: OS Patch Level

  1. Add new condition → Name: OS_Patched
  2. Type: OS → OS Version → Greater than or equal → e.g., 10.0.19042
    • [Screenshot: Posture Condition – OS Patch]

Step 3d: Required Application Installed

  1. Add new condition → Name: App_Check
  2. Type: Application → Installed Applications → Equals → Zoom OR Slack
  3. Logical operator = OR (between apps)
    • [Screenshot: Posture Condition – Application]

Validation:

  • Operations → Posture → Posture Reports → simulate endpoint → ensure each condition evaluates.

Step 4: Create Posture Policy with Automated Remediation

  1. GUI: Policy → Policy Sets → Posture Policy → Add New
  2. Name: Automated_Remediation_Policy
  3. Configure multi-condition logic:
IF (AV_Compliant = True) AND
   (Firewall_Enabled = True) AND
   (OS_Patched = True) AND
   (App_Check = True)
THEN Full_Access_Profile
ELSE Quarantine_Profile + CoA
  1. Enable Automated Remediation / CoA Trigger → sends change of authorization to NAD.
    • [Screenshot: Automated Remediation Policy]

Validation:

  • Connect a non-compliant endpoint → Live Logs → check that Quarantine Profile applied and CoA sent.

Step 5: Configure Authorization Profiles

Step 5a: Full Access

  1. GUI: Policy → Policy Elements → Results → Authorization → Authorization Profiles → Add
  2. Name: Full_Access_Profile
  3. Access: Permit → VLAN 20 / SGT 20
  4. Enable CoA for dynamic updates.
    • [Screenshot: Full Access Authorization Profile]

Step 5b: Quarantine / Limited Access

  1. Add new Authorization Profile → Name: Quarantine_Profile
  2. Access: Deny / restricted VLAN (e.g., VLAN 99)
  3. Enable CoA for automated remediation.
    • [Screenshot: Quarantine Authorization Profile]

Validation:

  • Endpoint connects → Live Logs shows correct profile assigned → VLAN/ACL applied.

Step 6: Configure NAD (Switch/WLC) for 802.1X + CoA

Step 6a: Switch CLI

aaa new-model
radius server ISE
 address ipv4 10.10.10.10 auth-port 1812 acct-port 1813
 key VerySecret123
!
dot1x system-auth-control
interface Gi1/0/10
 switchport mode access
 authentication port-control auto
 dot1x pae authenticator
 mab

Validation:

  • CLI: show authentication sessions interface Gi1/0/10 detail → Authorization Profile shows Quarantine / Full Access

Step 6b: WLC GUI

  1. Controller → Security → AAA → RADIUS → New
  2. Add ISE IP, Auth/Acct port, Shared Key
  3. WLAN → Security → Layer 2 → WPA2 802.1X → assign RADIUS server
  4. Enable CoA
    • [Screenshot: WLC RADIUS + CoA]

Validation:

  • Wireless endpoint → Live Logs → Posture evaluation triggered → correct profile applied

Step 7: Endpoint Agent Configuration

  1. Install AnyConnect / NAC Agent
  2. Enable Posture Module
  3. Connect endpoint → ISE evaluates posture → applies Full Access or Quarantine
    • [Screenshot: AnyConnect Posture Module]

Validation:

  • Live Logs → Compliance status displayed
  • Switch/WLC CLI → Authorization Profile updated

Step 8: Test Automated Remediation

  • Scenario: Non-Compliant Endpoint
    1. Missing app → connects → quarantined VLAN 99
    2. Endpoint installs missing app → Posture Module detects compliance
    3. ISE sends CoA → VLAN updated → Full Access granted

Validation:

  • Live Logs → Compliance = Compliant
  • Switch CLI → Authorization Profile updated
  • Endpoint → Network functional

Troubleshooting & Diagnostics

1. Key Diagnostic Tools

ToolPurposeLocation / CLI
ISE Live LogsReal-time visibility into authentication and posture eventsOperations → Live Logs → filter by Endpoint/Posture
Posture ReportsTrack endpoint compliance historyOperations → Reports → Posture → Device Compliance
Endpoint DetailsPer-endpoint posture evaluationOperations → Endpoints → select endpoint → Posture Results
CLI DebugsDetailed troubleshooting of CoA, posture, RADIUSdebug ise postureservice / debug radius / show authentication sessions interface GiX/X detail
Endpoint Agent LogsEndpoint-side condition evaluationAnyConnect/NAC Agent → Posture Module → logs

2. Common Issues & Step-by-Step Diagnostics

IssueSymptomDiagnosticsResolutionValidation
CoA not triggeringEndpoint remains quarantinedGUI: Check CoA enabled in Authorization ProfileCLI: debug radius, show authentication sessions interfaceEnable CoA on Authorization Profile and NAD; check UDP ports 1700/3799Live Logs → CoA sent; Switch CLI → profile updated
Endpoint stuck Non-CompliantFails AV, Firewall, or App conditionsLive Logs → check which condition failedEndpoint logsVerify agent installed; adjust posture conditions or logicEndpoint updates → Live Logs shows compliance
Fluctuating complianceEndpoint alternates Compliant/Non-CompliantEndpoint logs → check polling intervalNetwork stabilityAdjust polling; ensure stable network connectivityLive Logs stable, endpoint consistently Compliant
App detection failsRequired application not detectedGUI: Condition definitionEndpoint: agent logsCorrect condition syntax, verify app installedLive Logs → condition True
Endpoint never reaches Full AccessPolicy misconfiguredPosture Policy logic check (AND/OR, all conditions included)Correct multi-condition logicLive Logs → Full Access applied

CLI Commands for Troubleshooting

  1. Check endpoint authentication & posture status
show authentication sessions interface GiX/X detail
  1. Debug radius / CoA issues
debug radius
debug ise postureservice
  1. View live posture evaluations
show logging application ise postureservice
  1. Check CoA delivery and NAD response
debug dot1x all

GUI Validation Checklist

  • Live Logs → Non-Compliant / Compliant endpoints
  • Endpoint → Posture Module logs → condition results
  • Authorization Profile → VLAN/ACL applied
  • NAD → session shows correct authorization & CoA applied
  • Reports → Posture → Device Compliance → historical validation

Lab Walkthroughs with Validation

Scenario 1: Non-Compliant Endpoint Automatically Remediated

  1. Endpoint missing a required app → connects → Quarantined VLAN applied
  2. Live Logs → Posture Evaluation = Non-Compliant
  3. User installs missing app → AnyConnect/NAC Agent detects fix
  4. ISE sends CoA → VLAN updated → Full Access granted

Validation:

  • Switch CLI: show authentication sessions interface GiX/X detail → Full Access profile applied
  • Endpoint logs → Posture Module shows condition passed
  • Live Logs → Compliance updated to True

Scenario 2: AV Outdated Endpoint

  1. Endpoint AV outdated → Quarantine Profile applied
  2. User updates AV → Agent detects compliance
  3. ISE triggers CoA → Full Access applied

Validation:

  • Live Logs → AV_Compliant = True
  • Switch/WLC → Authorization Profile updated
  • Endpoint → Network access restored

Scenario 3: Multi-App Compliance

  1. Endpoint missing Finance App2 → Non-Compliant → VLAN 50 Quarantine
  2. User installs App2 → Agent reports compliance → CoA triggers
  3. VLAN restored → Full Access to Finance VLAN

Validation:

  • Live Logs → Multi-condition evaluation per app
  • Switch CLI → Authorization Profile shows Full Access
  • Endpoint → App connectivity verified

Expert Level Use Cases (Step-by-Step Mapping + Validation)

Use Case 1: BYOD Automated Remediation

  • Step 1: Endpoint Profile = BYOD
  • Step 2: Posture Policy = AV, Firewall, OS, Required Apps
  • Step 3: Authorization Profile = Quarantine VLAN if non-compliant
  • Step 4: Endpoint updates app or patch → ISE triggers CoA → Full Access
  • Validation: Live Logs → Compliance True; Switch/WLC → VLAN updated dynamically

Use Case 2: Corporate Laptops Full Access

  • Step 1: Endpoint Profile = Corporate Device
  • Step 2: Posture Policy = AV + Firewall + OS + App
  • Step 3: Authorization Profile = Full Access VLAN
  • Step 4: Endpoint connects → automatically evaluated → Full Access granted
  • Validation: Live Logs → All conditions True; Endpoint → Network access functional

Use Case 3: Finance VLAN Multi-App Enforcement

  • Step 1: Posture Policy = Finance App1 AND App2 + AV + Firewall
  • Step 2: Authorization Profile = Finance VLAN (restricted)
  • Step 3: Endpoint connects missing App2 → Non-Compliant → VLAN restricted
  • Step 4: Install missing app → CoA triggers → Full Access restored
  • Validation: Live Logs → Posture evaluation per app; Switch CLI → VLAN updated

Use Case 4: Dynamic Patch Compliance

  • Step 1: Endpoint OS patch missing → Non-Compliant → Quarantine VLAN
  • Step 2: Endpoint applies patch → Agent detects compliance
  • Step 3: ISE triggers CoA → Full Access applied automatically
  • Validation: Live Logs → OS_Patched condition True; Switch CLI → Authorization updated

Use Case 5: Custom Posture Modules (CPM)

  • Step 1: Script checks for custom service/process
  • Step 2: Include CPM in multi-condition policy
  • Step 3: Endpoint executes script → ISE evaluates result
  • Step 4: Non-compliant → Quarantine; Compliant → Full Access
  • Validation: Live Logs → CPM condition evaluated; Endpoint logs → shows script result

FAQs – Automated Remediation for Non‑Compliance

1. Q: Why isn’t CoA triggering when a previously non-compliant endpoint becomes compliant?
A:

  • Check Authorization Profile → CoA must be enabled.
  • Ensure NAD supports CoA (UDP 1700/3799 open).
  • Validate via CLI:
show authentication sessions interface GiX/X detail
debug radius
  • Live Logs: confirm CoA sent event.

2. Q: How do I differentiate BYOD from corporate devices for automated remediation policies?
A:

  • Use Endpoint Profiles with ownership attribute (BYOD / Corporate).
  • Assign different posture policies and Authorization Profiles per type.
  • Validate by connecting a BYOD endpoint → ensure proper policy triggers in Live Logs.

3. Q: Can I enforce multiple applications alongside AV, firewall, and OS patch conditions?
A:

  • Yes, create a multi-condition posture policy using AND/OR logic.
  • Example: AV AND Firewall AND OS AND (App1 OR App2)
  • Validate each condition via Posture Result Details in Live Logs.

4. Q: How can I verify that each condition in a multi-condition policy is evaluated correctly?
A:

  • GUI: Operations → Posture → Live Logs → select endpoint → Posture Result Details
  • Endpoint: AnyConnect / NAC Agent logs → each condition listed True/False
  • CLI: debug postureservice → confirm evaluation sequence

5. Q: What happens if the NAD doesn’t support CoA?
A:

  • Endpoint remains in its current VLAN/profile until next authentication
  • Workarounds:
    • Upgrade NAD firmware
    • Use fallback VLAN / restricted ACL policy
  • Validate by testing endpoint remediation → VLAN/profile change expected to fail

6. Q: How can I test automated remediation before production rollout?
A:

  • Set up lab endpoints simulating non-compliance scenarios: missing apps, outdated AV, firewall disabled
  • Connect endpoints → observe Live Logs for posture evaluation
  • Fix issues → ensure CoA triggers and full access restored
  • Validate via switch/WLC CLI and endpoint network access

7. Q: Can endpoint agents notify users automatically about non-compliance?
A:

  • Yes, enable AnyConnect / NAC Agent notifications
  • Configure Posture Module to display required actions (e.g., install app, enable firewall)
  • Validation: endpoint user sees pop-up → completes remediation → Live Logs shows compliance

8. Q: How do I troubleshoot endpoints that fluctuate between compliant and non-compliant?
A:

  • Check agent polling interval (too frequent can cause false negatives)
  • Validate network stability between endpoint and ISE
  • CLI: show authentication sessions interface GiX/X detail, debug ise postureservice
  • Endpoint logs → review Posture Module evaluation timestamps
  • Adjust settings → ensure stable compliance evaluation

9. Q: Does automated remediation work for VPN sessions as well?
A:

  • Yes, if AnyConnect NAC Agent is installed and Posture Module enabled
  • Posture policies can be applied to VPN connections → CoA triggers once compliant
  • Validation: connect via VPN → check Live Logs → Authorization Profile update after remediation

10. Q: Can custom scripts (Custom Posture Modules) be used for automated remediation?
A:

  • Yes, CPM can check custom processes, services, registry values, or files
  • Include CPM in multi-condition posture policy
  • Endpoint executes script → result evaluated by ISE → triggers remediation
  • Validation: Live Logs → CPM condition True/False, endpoint profile updated, network access restored

YouTube Link

For more in-depth Cisco ISE Mastery Training, subscribe to my YouTube channel Network Journey and join my instructor-led classes for hands-on, real-world ISE experience

[NEW COURSE ALERT] CISCO ISE (Identity Service Engine) by Sagar Dhawan
CCIE Security v6.1 Training – Ticket#1 Discussed
CCIE Security v6.1 – MAC Authentication Bypass (MAB) in Cisco ISE
CCNP to CCIE SECURITY v6.1 – New Online Batch

Closing Notes

  • Automated remediation reduces IT effort, increases security, and maintains productivity.
  • Key components: Posture Service, Multi-Condition Policies, CoA, Authorization Profiles, Endpoint Agent.
  • Validate every component: Live Logs, switch/WLC CLI, endpoint logs.
  • Combine with BYOD, corporate devices, and multi-app policies for real-world production readiness.

Upgrade Your Skills – Start Today

For more in-depth Cisco ISE Mastery Training, subscribe to my YouTube channel Network Journey and join the instructor-led classes.

Fast-Track to Cisco ISE Mastery Pro — 4-month live training. Full labs, real-world automated remediation scenarios.
Course outline: https://course.networkjourney.com/ccie-security/

  • Hands-on labs
  • Real-world posture and remediation enforcement
  • CoA & dynamic policy training
  • BYOD + corporate automated compliance

“Reserve Your Seat – Download Free Lab Workbook”

Enroll Now & Future‑Proof Your Career
Emailinfo@networkjourney.com
WhatsApp / Call: +91 97395 21088